Loading…

Security Analysis on a Three-Factor Authentication Scheme of 5G Wireless Sensor Networks for IoT System

To ensure the secure access control mechanisms for the wireless sensor networks (WSN) with a 5G-enabled IoT system, very recently, Sahoo et al. (IEEE Internet of Things Journal, 10(17), pp. 15087-15099, DOI: 10.1109/JIOT.2023.3264565, Sep. 1, 2023) proposed a three-factor-based authentication scheme...

Full description

Saved in:
Bibliographic Details
Published in:IEEE internet of things journal 2024-04, Vol.11 (8), p.1-1
Main Authors: Xie, Qingyun, Xie, Qi
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:To ensure the secure access control mechanisms for the wireless sensor networks (WSN) with a 5G-enabled IoT system, very recently, Sahoo et al. (IEEE Internet of Things Journal, 10(17), pp. 15087-15099, DOI: 10.1109/JIOT.2023.3264565, Sep. 1, 2023) proposed a three-factor-based authentication scheme of 5G WSN for IoT system, and claimed that their scheme can achieve all security properties. However, in this paper, we carefully analyze their scheme and point out that their scheme is vulnerable to user impersonation attacks, sensor node captured attacks, simultaneous impersonation attacks on the gateway and sensor node, and cannot achieve user unlinkability and three-factor secrecy, and an adversary can obtain the encrypted data sent from the sensor node, and can also forge the encrypted data. In addition, we analyze the reasons why their scheme suffers from these attacks and propose the remedial suggestions.
ISSN:2327-4662
2327-4662
DOI:10.1109/JIOT.2023.3334708